You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
kratos/third_party/google/cloud/websecurityscanner/v1alpha/finding.proto

140 lines
5.3 KiB

// Copyright 2018 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
syntax = "proto3";
package google.cloud.websecurityscanner.v1alpha;
import "google/api/annotations.proto";
import "google/cloud/websecurityscanner/v1alpha/finding_addon.proto";
option go_package = "google.golang.org/genproto/googleapis/cloud/websecurityscanner/v1alpha;websecurityscanner";
option java_multiple_files = true;
option java_outer_classname = "FindingProto";
option java_package = "com.google.cloud.websecurityscanner.v1alpha";
// A Finding resource represents a vulnerability instance identified during a
// ScanRun.
message Finding {
// Types of Findings.
enum FindingType {
// The invalid finding type.
FINDING_TYPE_UNSPECIFIED = 0;
// A page that was served over HTTPS also resources over HTTP. A
// man-in-the-middle attacker could tamper with the HTTP resource and gain
// full access to the website that loads the resource or to monitor the
// actions taken by the user.
MIXED_CONTENT = 1;
// The version of an included library is known to contain a security issue.
// The scanner checks the version of library in use against a known list of
// vulnerable libraries. False positives are possible if the version
// detection fails or if the library has been manually patched.
OUTDATED_LIBRARY = 2;
// This type of vulnerability occurs when the value of a request parameter
// is reflected at the beginning of the response, for example, in requests
// using JSONP. Under certain circumstances, an attacker may be able to
// supply an alphanumeric-only Flash file in the vulnerable parameter
// causing the browser to execute the Flash file as if it originated on the
// vulnerable server.
ROSETTA_FLASH = 5;
// A cross-site scripting (XSS) bug is found via JavaScript callback. For
// detailed explanations on XSS, see
// https://www.google.com/about/appsecurity/learning/xss/.
XSS_CALLBACK = 3;
// A potential cross-site scripting (XSS) bug due to JavaScript breakage.
// In some circumstances, the application under test might modify the test
// string before it is parsed by the browser. When the browser attempts to
// runs this modified test string, it will likely break and throw a
// JavaScript execution error, thus an injection issue is occurring.
// However, it may not be exploitable. Manual verification is needed to see
// if the test string modifications can be evaded and confirm that the issue
// is in fact an XSS vulnerability. For detailed explanations on XSS, see
// https://www.google.com/about/appsecurity/learning/xss/.
XSS_ERROR = 4;
// An application appears to be transmitting a password field in clear text.
// An attacker can eavesdrop network traffic and sniff the password field.
CLEAR_TEXT_PASSWORD = 6;
}
// Output only.
// The resource name of the Finding. The name follows the format of
// 'projects/{projectId}/scanConfigs/{scanConfigId}/scanruns/{scanRunId}/findings/{findingId}'.
// The finding IDs are generated by the system.
string name = 1;
// Output only.
// The type of the Finding.
FindingType finding_type = 2;
// Output only.
// The http method of the request that triggered the vulnerability, in
// uppercase.
string http_method = 3;
// Output only.
// The URL produced by the server-side fuzzer and used in the request that
// triggered the vulnerability.
string fuzzed_url = 4;
// Output only.
// The body of the request that triggered the vulnerability.
string body = 5;
// Output only.
// The description of the vulnerability.
string description = 6;
// Output only.
// The URL containing human-readable payload that user can leverage to
// reproduce the vulnerability.
string reproduction_url = 7;
// Output only.
// If the vulnerability was originated from nested IFrame, the immediate
// parent IFrame is reported.
string frame_url = 8;
// Output only.
// The URL where the browser lands when the vulnerability is detected.
string final_url = 9;
// Output only.
// The tracking ID uniquely identifies a vulnerability instance across
// multiple ScanRuns.
string tracking_id = 10;
// Output only.
// An addon containing information about outdated libraries.
OutdatedLibrary outdated_library = 11;
// Output only.
// An addon containing detailed information regarding any resource causing the
// vulnerability such as JavaScript sources, image, audio files, etc.
ViolatingResource violating_resource = 12;
// Output only.
// An addon containing information about request parameters which were found
// to be vulnerable.
VulnerableParameters vulnerable_parameters = 13;
// Output only.
// An addon containing information reported for an XSS, if any.
Xss xss = 14;
}